Bunker computer code: Difference between revisions

Jump to navigation Jump to search
no edit summary
(added analysis of pre-decoding table layout)
No edit summary
 
Line 58: Line 58:
  C3.1 = W F1.2 = H F4.1 = A B2.1 = T '''A3.2 = C''' E4.2 = O F4.2 = N G2.6 = N G3.2 = E '''A3.2 = C'''
  C3.1 = W F1.2 = H F4.1 = A B2.1 = T '''A3.2 = C''' E4.2 = O F4.2 = N G2.6 = N G3.2 = E '''A3.2 = C'''
  G1.5 = T F1.1 = S F4.1 = A G3.3 = L G3.4 = L B2.1 = T G1.4 = H B2.3 = E G2.4 = S H4.5 = E
  G1.5 = T F1.1 = S F4.1 = A G3.3 = L G3.4 = L B2.1 = T G1.4 = H B2.3 = E G2.4 = S H4.5 = E
This results in the ARG-related question {{Encryption-key}} <code>WHATCONNECTSALLTHESE</code>, which is also used as a key in the [[Reactor lights code|reactor lights code]] and the [[Wasteland notes]]. {{Needs-investigation}} It is the only key used twice as it is known so far.
This results in the ARG-related question {{Encryption-key}} <code>WHATCONNECTSALLTHESE</code>, which is also used as a key in the [[Reactor lights code|reactor lights code]] and the [[Wasteland notes]]. {{Needs-investigation}} It is the only key used twice as it is known so far- making the keys text the answer to itself, a connector between various puzzles.


==Second reference table decoded==
==Second reference table decoded==
57

edits

Navigation menu